<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6023 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6023/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 08:16:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6023/feed.xml" rel="self" type="application/rss+xml"/><item><title>Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)</title><link>https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</link><pubDate>Wed, 22 Apr 2026 08:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</guid><description>An insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.</description><content:encoded><![CDATA[<p>CVE-2026-6023 exposes a critical vulnerability within the RadFilter control of Progress Telerik UI for AJAX. Affecting versions 2024.4.1114 to 2026.1.421, this flaw stems from insecure deserialization practices. The vulnerability arises when the filter state is exposed to the client, enabling malicious actors to manipulate this state. Successful exploitation grants attackers the ability to execute arbitrary code on the server. This vulnerability poses a significant risk to organizations utilizing the affected Telerik UI for AJAX versions, potentially leading to complete system compromise and data breaches. Defenders must promptly address this issue through patching or mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a web application utilizing a vulnerable version of Progress Telerik UI for AJAX (2024.4.1114 - 2026.1.421) with the RadFilter control enabled.</li>
<li>The attacker observes the RadFilter control&rsquo;s behavior, specifically how filter states are serialized and exposed to the client-side, typically within the HTTP request or response.</li>
<li>The attacker intercepts the serialized filter state data, often Base64 encoded or similar, transmitted between the client and server.</li>
<li>The attacker crafts a malicious serialized payload containing instructions to execute arbitrary code on the server. This involves exploiting the insecure deserialization process.</li>
<li>The attacker replaces the original, legitimate serialized filter state with the malicious payload.</li>
<li>The attacker sends the modified request containing the malicious serialized data to the server.</li>
<li>The Telerik UI for AJAX application on the server attempts to deserialize the tampered data using the RadFilter control.</li>
<li>Due to the insecure deserialization vulnerability, the malicious payload is executed, granting the attacker remote code execution on the server. The attacker can then perform actions such as installing malware, exfiltrating sensitive data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6023 can lead to complete compromise of the affected server. An attacker can gain remote code execution, enabling them to install malware, steal sensitive data, or disrupt critical business operations. Given the widespread use of Telerik UI in enterprise applications, this vulnerability could potentially impact a large number of organizations across various sectors. Unpatched systems are at high risk of being exploited, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Progress Telerik UI for AJAX to a patched version outside the range of 2024.4.1114 through 2026.1.421 to remediate CVE-2026-6023.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Telerik RadFilter Deserialization Attempt</code> to identify attempts to exploit the deserialization vulnerability by monitoring for suspicious HTTP requests targeting the RadFilter control (Log source: webserver).</li>
<li>Implement input validation and sanitization on the server-side to prevent malicious data from being deserialized.</li>
<li>Monitor web server logs for unusual activity related to the RadFilter control, such as requests with abnormally large or malformed serialized data (Log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6023</category><category>telerik</category><category>deserialization</category><category>rce</category><category>webserver</category></item></channel></rss>